Skip to content

Commit 30af309

Browse files
Merge pull request #265473 from chasewilson/chase/outboundTypeMigrationGA
remove preview language for outbound type migration
2 parents 539d049 + 2e67ad6 commit 30af309

File tree

1 file changed

+3
-5
lines changed

1 file changed

+3
-5
lines changed

articles/aks/egress-outboundtype.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.subservice: aks-networking
66
ms.custom: devx-track-azurecli
77
ms.author: allensu
88
ms.topic: how-to
9-
ms.date: 02/02/2024
9+
ms.date: 02/06/2024
1010
#Customer intent: As a cluster operator, I want to define my own egress paths with user-defined routes. Since I define this up front I do not want AKS provided load balancer configurations.
1111
---
1212

@@ -17,7 +17,7 @@ You can customize egress for an AKS cluster to fit specific scenarios. By defaul
1717
This article covers the various types of outbound connectivity that are available in AKS clusters.
1818

1919
> [!NOTE]
20-
> You can now update the `outboundType` after cluster creation. This feature is in preview. See [Updating `outboundType after cluster creation (preview)](#updating-outboundtype-after-cluster-creation-preview).
20+
> You can now update the `outboundType` after cluster creation.
2121
2222
## Limitations
2323

@@ -64,7 +64,7 @@ You must deploy the AKS cluster into an existing virtual network with a subnet t
6464

6565
For more information, see [configuring cluster egress via user-defined routing](egress-udr.md).
6666

67-
## Updating `outboundType` after cluster creation (preview)
67+
## Updating `outboundType` after cluster creation
6868

6969
Changing the outbound type after cluster creation will deploy or remove resources as required to put the cluster into the new egress configuration.
7070

@@ -97,8 +97,6 @@ Migration is only supported between `loadBalancer`, `managedNATGateway` (if usin
9797
> [!WARNING]
9898
> Changing the outbound type on a cluster is disruptive to network connectivity and will result in a change of the cluster's egress IP address. If any firewall rules have been configured to restrict traffic from the cluster, you need to update them to match the new egress IP address.
9999
100-
[!INCLUDE [preview features callout](includes/preview/preview-callout.md)]
101-
102100
### Update cluster to use a new outbound type
103101

104102
> [!NOTE]

0 commit comments

Comments
 (0)